Articles

Windows 10 Shortcuts – 2018 Update

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. We use the following keyboard shortcuts every day: Base Key + Combination Result + A Open action center + C Launch Cortana Assistant in listening mode + S Search […]

Articles

History of IIoT Cyber Attacks 2007 – 2016

The Industrial Internet of Things (IIoT), aka the Industrial Internet, is the integration of complex machinery with networked sensors and software. The machines are connected and talking to each other, and communicating back to centralized control systems e.g. Manufacturing factories, Power Plants, Energy Grids, Semiconductors, Automotive, Aerospace and Commercial Building Automation. The IIoT is polsed […]

Tutorials

Bruteforce Password Cracking with Medusa – Kali Linux

In Greek mythology, Medusa was a monster, a Gorgon, generally described as a winged human female with living venomous snakes in place of hair. Medusa is a speedy, parallel, and modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. Download Link – http://www.foofus.net/jmk/tools/medusa-2.0.tar.gz The author considers following items […]

Tutorials

Top 20 Basic Kali Linux Commands

Kali Linux is an open source operating system developed by Offensive Security . It contains a bunch of security tools divided by categories for Penetration Testing or Ethical Hacking in a practical environment to test the reliability and security of the systems in the unusual situations. 1. Date Command –  This command is generally used […]

Articles

21 Must Have Firefox Plugins for Hackers – 2018 Update

As you know, Firefox is one of the most popular browser not by ranking but it also supports add-on/plugins to enhance the functionality. Mozilla has a website where you can find various plugins placed in different categories. So we’re explaining the top 21 Mozilla Firefox add-on/plugins which are using by Hackers as well as Security […]

Tutorials

CMS & Exploit Kit Detection with WhatCMS

In Internet, more than 70% websites are using ready-made open source CMS like WordPress/Joomla/Drupal etc because a CMS always makes your website easier to use, less expensive to maintain. As we all knows, CMS is a software that stores your web content, enables easy editing for web administrators/editors and allows multiple web administrators to log […]

Tutorials

Crimemail CTF Writeup – Solution

This Crimemail CTF is brought you by InSecurity, a student society from INSA Lyon (France). The Flag format should be look like INSA{…} Collins Hackle is a notorious bad guy who is behind in this CTF. Challenge – Your challenge is to bypass the Login page and capture the flag. Hint: His password’s md5 is […]

Tutorials

CTF – Kioptrix Level 4 – Walkthrough step by step

Welcome back to Kioptrix CTF Series! Previously we’ve covered up to 3 Levels of Kioptrix series CTF which you can find by this link. Alright lets start the 4th level of Kioptrix series. Download Link – http://www.kioptrix.com/dlvm/Kioptrix4_vmware.rar (Level 1.3) Size – 213MB As always, when you try to solve any Vulnhub VM, your first step is […]